StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Change Management Plans for Secure It Systems - Essay Example

Cite this document
Summary
The paper "Change Management Plans for Secure It Systems" discusses that change is one of the most frequently seen approaches among the management in the modern-day business units. Change is initiated in various business domains by designated and specialist officials…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Change Management Plans for Secure It Systems
Read Text Preview

Extract of sample "Change Management Plans for Secure It Systems"

Change Management Plans for Secure IT Systems INTRODUCTION It is universally known that change is among the most constant and certain things in the life of people. It can be extensively witnessed in each and every domain of the contemporary society. Contextually, in the modern day business environment, change is considered to be an important part of operational process of business units irrespective of their industry background. In order to get a better understanding in this context, identifying the importance of change in the information technology (IT) sector will be crucial. In the IT sector, with the augmented level of market competition along with transforming nature of demands of the customers, proper and timely changes in conducting the business has indeed become crucial up to a certain extent. However, it is widely believed that proper change management approach is significant which further helps in developing a systematic framework enabling proper application of the changes planned (Paton and McCalman 1-22). CHANGE MANAGEMENT Change management is a particular approach of business units to transform the operations of business towards a particular set direction for the purpose of future wellbeing in a smooth and successful manner altogether. It involves a systematic process which is executed by the management of the business or the change management team. Notably, change management is a methodical way of implementing a change in any domain of business where the perspectives of both the organizational wellbeing as well as the wellbeing of the human resources at different levels are taken into consideration. It is believed that change management has diverse aspects which comprise adapting to the implemented or proposed change, managing as well as monitoring the change and ensuring the effectiveness of the change among others. It will be crucial to state that proactive approach towards dealing with any sort of organizational change includes the three aforementioned core elements. Change management has a direct impact on the operational wellbeing and profitability of any business (Queensland Government, “Change Management Best Practices Guide”). ROLE OF CSO IN CHANGE MANAGEMENT CSS which stands for Chief Security Officer has a prominent role in the domain of IT security systems. The person designated in this role is responsible for all the security related issues in the IT sector. In the IT sector, the CSO has varied roles to depict which further comprise internal consultant, as a specialist and as a change agent among others. CSOs in the IT sector are involved with the formation of internal strategies that steer the decision of the business in a particular direction. Contextually, as a change agent within the IT security domain, the role of CSO involves proper and successful execution of the proposed planning for initiating changes in the business. This also means that CSO has the role to assure that the strategies of the change management are enacted with utmost fidelity. He/she acts as an enabler where there is a need to try and accumulate maximum number of people towards adopting the change with utmost efficacy. The CSO will need to see the security efforts at various sections of the business which include the domain of information technology, human resources and operational domain and propose necessary changes that are deemed to be fit towards enhancing the operational effectiveness of the overall business. Since the designation of a CSO is at the highest position in terms of the security measures of a business, he/she is accountable for the entire security system of the business and is authorized to make any changes within the security system of the business (Massachusetts Institute of Technology, “The Role of the Chief Strategy Officer”). PROCESS OF APPROVING A CHANGE Initiating change in business is not an aspect that is decided overnight; rather it involves a systematic process which is important with regard to proper and successful accomplishment of the change. Besides, it is also known that the aspect of approving a particular change in any domain of the business also has certain specific processes that are being followed. Prior to the approval of any change, there are certain aspects that are extensively evaluated. Correspondingly, one of the major steps prior to approving any particular change is analyzing the potential benefits of the change. It is believed that change is introduced in business processes with the intention to enhance the operational efficacy of the same along with further benefiting the overall business operations. Likewise, it is vital to have a proper and realistic benefit for any proposed change to get an approval from the top level management. Again, another important step that is being considered prior to approving any change is the reasonability of the cost associated with it though its evaluation as per the probable benefits. If the cost of the project of change implementation does not move hand in hand with the benefits, its approval from the top level management is deemed to be highly uncertain. The next stage of the process of approving a change is through evaluating the potential risks and the impacts associated with the same. It is believed that with any changes in any domain of the business, there is every possibility of accompanying risks which might adversely affect the business. Hence, analyzing the extent of the impact of the risk is another vital stage in the approval process of a proposed change. The subsequent step of the change approval process involves the analysis of the available resources and its competencies to execute the change within the business (Kerzner 518-520). Notably, this is one of the most important stages of the change approval process as non-availability of the required resources will certainly result in an increase in the cost for the business in the change initiation process (Nathan, Jones, Stackpole and Lambert 480-495). Hence, it can be depicted that after prior analysis of all these aspects any particular change is approved. ROLE OF CSO IN APPROVING CHANGE As mentioned above, a CSO is primarily involved in bringing positive changes within the security system of a particular business. In this regard, it has also been noted that the CSO also has a key role to perform in the process of approving the proposed change in the security system of a particular business concern. Notably, the CSO has quite a rational role in the development of any change strategy with regard to security system of the business right from the grass root level. Hence, he/she has the opportunity to develop the change strategy in a way that meets the criteria for its approval set by the management of any business. The CSO will need to assure that the developed change strategy is compact as well as cost efficient and it is able to benefit the business to the maximum extent. CSO will also need to assure the flexibility of the resources available so that he/she could be able to execute the changes in the business in the security system domain in an extensive manner altogether. It has also been noted that the CSO acts or is designated as a highly specialized person within the domain of security system and his/her proposed change will be considered more appropriate by the management which further increases the chances of getting the approval for the change (Massachusetts Institute of Technology, “The Role of the Chief Strategy Officer”). Hence, it is quite apparent that the CSO has the ability to simplify the entire process of change approval with utmost efficacy. CONCLUSION From the overall analysis, it can be concluded that change is one of the most frequently seen approaches among the management in the modern day business units. Change is initiated in various business domains by designated and specialist officials. Contextually, Chief Security Officer (CSO) is deemed to be accountable for making necessary changes in the domain of security system within the company. He/she also has the authority to propose as well as develop the change strategies and present them in front of the management to ensure their prior approval. Works Cited Kerzner, Harold R. Project Management - Best Practices: Achieving Global Excellence. United States: John Wiley & Sons, 2014. Print. “The Role of the Chief Strategy Officer.” Massachusetts Institute of Technology. 2014. Web. 29 May. 2014. Nathan, Peter, Gerald Everett Jones, Cynthia Stackpole, and Lee Lambert. PMP Certification All-In-One Desk Reference for Dummies. United States: John Wiley & Sons, 2011. Print. Paton, Robert A. and James McCalman. Change Management: A Guide to Effective Implementation. London: SAGE, 2008. Print. “Change Management Best Practices Guide.” Queensland Government. n.d. Web. 29 May. 2014. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Change Management Plans for Secure It Systems Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Change Management Plans for Secure It Systems Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1829971-change-management-plans-for-secure-it-systems
(Change Management Plans for Secure It Systems Essay Example | Topics and Well Written Essays - 1250 Words)
Change Management Plans for Secure It Systems Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1829971-change-management-plans-for-secure-it-systems.
“Change Management Plans for Secure It Systems Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1829971-change-management-plans-for-secure-it-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Change Management Plans for Secure It Systems

Design System and Security Control

rdquo; As we know it's possible to implement secure access to both data and functionality for example access to monthly sales figures and the ability to fire a given employee respectively.... An essay "Design System and Security Control" reports that there are a number of system security and control requirements that are required for the implementation of the ACA Technology....
13 Pages (3250 words) Essay

Company Analysis - Volkswagen Group in Forest, Brussels

The processes employed in the Group's production unit in Forest, Brussels are reviewed and evaluated emphasizing on the effectiveness of this unit's quality and cost management.... Finally, the phases of the process that are of key value for its success, meaning the cost management techniques and the quality management techniques as used in the specific production unit, should be further analyzed, followed by suggestions as of their potential update or alteration for supporting the increase of the Group's performance....
13 Pages (3250 words) Essay

STRATEGIC CHANGE MANAGEMENT NHS

hellip; Strategic change management – NHS.... The above theory is used in a particular phase of change management: the implementation phase.... Through a different point of view, the Open systems theory promotes the idea that ‘all organizations are members of an open system' (Wilson 1992, p.... ifferent approaches have been used in the literature for explaining the reasons for promoting strategic change within modern organizations....
12 Pages (3000 words) Essay

Disasters and the Different Hazard Management Agencies That Combat Them

These plans were established in coordination with the Commonwealth Government authorities and representatives of the oil industry as well as the maritime authorities.... These plans help support the program ‘National Plan to Combat Pollution of the Sea by Oil and other Noxious and Hazardous Substances' (NATPLAN) (Gile, 2009).... INTERACTION WITH OTHER plans 2.... These matters are indicated under the Disaster Management Act 2003 and associated plans....
15 Pages (3750 words) Essay

Secure Computer System - Case Studies

he following topics may also have contributed to the incident, these are;Password usage and management; this includes creation of passwords, frequency of changing the password and methods used in protection.... Factors considered when converting a section of general office space to server room; firstly, the walls should not be close to exterior walls which could be damp because of containing water....
11 Pages (2750 words) Case Study

Applying Systems Theory to an Educational Setting

The paper "Applying systems Theory to an Educational Setting" describes that many would argue against the decision-making by minority owners as reflected in the case study.... hellip; The exploration of relevant systems, with respect to that of problem situations, is now necessary.... Having prepared the snapshot Rich Picture of DPSB's present situation, A useful strategy for generating our relevant systems is to do some brainstorming.... These plans usually require measurable outcomes for the institution to know what they have achieved and how they have fared so far....
20 Pages (5000 words) Assignment

Management and Implementation of Secure Information Systems

This assignment "Management and Implementation of Secure Information systems" discusses principles of a public key encryption system, comparing them with those of asymmetrical cryptosystem.... Symmetric encryption is also known as single-key encryption or conventional encryption....
9 Pages (2250 words) Assignment

Change Management Plans for Secure IT Systems

This change management ensures it reduces downtime in… ice delivery and that there is recording of requests for change, evaluation, authorization, prioritizing, planning, testing, implementing, documenting and reviewing of this requests (Bon, 2004). ... These organizations and industries, therefore, to achieve the improvements have examined the processes in the areas of change management that the network changes are a source of downtime (Peters, 2000)....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us